Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 11:25
Static task
static1
Behavioral task
behavioral1
Sample
802efe76cb0751130b24ca06e72cd79f91fd2d67b50e99700e85d4c64437ec67.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
802efe76cb0751130b24ca06e72cd79f91fd2d67b50e99700e85d4c64437ec67.exe
Resource
win10v2004-20240802-en
General
-
Target
802efe76cb0751130b24ca06e72cd79f91fd2d67b50e99700e85d4c64437ec67.exe
-
Size
1.3MB
-
MD5
9faf43b48f7fec261c1fa95a42c88418
-
SHA1
782f972ec6af58f88ad7adf5da1a31b6007a620f
-
SHA256
802efe76cb0751130b24ca06e72cd79f91fd2d67b50e99700e85d4c64437ec67
-
SHA512
b6e303bb587d0e79ca3e71a2ada43e57acfe607849a7bfe6c0a46f1e5ade246d12718ea04528efbbb9a5d260be933c89d3472e5640e5d635af3a203ab5f3418d
-
SSDEEP
24576:OwsJ0WBON/bsRqUeDEzkzuHg+81rq530L:Ow25+/ARIEzJB8d
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 802efe76cb0751130b24ca06e72cd79f91fd2d67b50e99700e85d4c64437ec67.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 224 802efe76cb0751130b24ca06e72cd79f91fd2d67b50e99700e85d4c64437ec67.exe 224 802efe76cb0751130b24ca06e72cd79f91fd2d67b50e99700e85d4c64437ec67.exe 224 802efe76cb0751130b24ca06e72cd79f91fd2d67b50e99700e85d4c64437ec67.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\802efe76cb0751130b24ca06e72cd79f91fd2d67b50e99700e85d4c64437ec67.exe"C:\Users\Admin\AppData\Local\Temp\802efe76cb0751130b24ca06e72cd79f91fd2d67b50e99700e85d4c64437ec67.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:224